[a] [c]hronological record that reconstructs and examines the sequence of activities surrounding or leading to a specific operation, procedure, or event in a security relevant transaction from inception to final result.[1]
the results of monitoring each operation of subjects on objects; for example, an audit trail might be a record of all actions taken on a particularly sensitivefile or a record of all users who viewed that file.[3]
In electronic commerce a good audit trail can help resolve programming errors and discrepancies in the how a transaction is recorded by the parties to the transaction.
"Audit trails may be used as either a support for regular system operations, or as a kind of insurance policy, or as both of these. As insurance, audit trails are maintained but are not used unless needed, such as after a system outage. As a support for operations, audit trails are used to help system administrators ensure that the system or resources have not been harmed by hackers, insiders, or technical problems."[7]
Electronic audit trails must provide a chain of custody for the secureelectronic transaction that identifies sending location, sending entity, date and time stamp of receipt, and other measures used to ensure the integrity of the document. These audit trails must be sufficiently complete and reliable to validate the integrity of the transaction and to prove, a) that the connection between the sender and the recipient has not been tampered with, and b) how the document was controlled upon receipt.[8]